X-Con Spyware Destroyer
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0
General information:
Malware Name: |
X-Con Spyware Destroyer |
Malware Type: |
Adware |
Company Name: |
X-Con Spyware Destroyer |
Company URL: |
http://x-conspywaredestroyer.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
The only anti-spyware product in the market with Freeze Scan Technology. Developed by the creators of X-Con Spyware Destroyer, the freezer scan stop malware in its tracks by freezing our system before a full scan. The X-Con Spyware Destroyer is a
complete Anti-Spyware program. It provides full registry, folder and file scan. It also contains the feature of regular update.
Spyware Description:
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0
Characteristics/Symptoms:
-> False positives work as good to purchase -> False scan results -> Uses inadequate scan/detection scheme -> Uses out of date ref database0
Additional information might be found here:
Processes Running:
X-Con Spyware Destroyer.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Desktop\X-Con Spyware Destroyer.lnk |
1656 |
Shortcut |
C:\Program Files\X-Con Spyware Destroyer\License.txt |
4351 |
Text Document |
C:\Program Files\X-Con Spyware Destroyer\image.ico |
3774 |
Icon |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\X-Con Spyware Destroyer Suite |
UninstallString |